A security architecture for the Internet protocol
IBM Systems Journal
Initialization Vector Attacks on the IPsec Protocol Suite
WETICE '00 Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
Probable Plaintext Cryptanalysis of the IP Security Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Wireless LAN security and laboratory designs
Journal of Computing Sciences in Colleges
Analysis of the 802.11i 4-way handshake
Proceedings of the 3rd ACM workshop on Wireless security
A modular correctness proof of IEEE 802.11i and TLS
Proceedings of the 12th ACM conference on Computer and communications security
Laboratory experiments for network security instruction
Journal on Educational Resources in Computing (JERIC)
Typical DoS/DDoS Threats under IPv6
ICCGI '07 Proceedings of the International Multi-Conference on Computing in the Global Information Technology
Problem areas for the IP security protocols
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i
Mobility '06 Proceedings of the 3rd international conference on Mobile technology, applications & systems
Cryptography in theory and practice: the case of encryption in IPsec
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Hi-index | 0.00 |
The IEEE 802.11--2007, like its earlier versions, provides a robust MAC layer with the help of mandatory CCMP and comprehensive key-generation, derivation, and distribution mechanisms. However, the physical layer continues to be without any protection from signal privacy attacks and anonymity of attacker within the WLAN, and it has no solution in the standard. The MAC layer, too, has not quite achieved the confidence of the networking community at the level of IPsec as of yet. In this paper, we present the results of a study that looks at the IEEE 802.11--2007 MAC security in juxtaposition to IPsec. We thus compare the attacks that can be thwarted by IEEE 802.11--2007 MAC as well as IPsec and the manners in which they can be thwarted by each security layer. The results can be used to propose enhancements to the IEEE 802.11--2007 MAC layer in order for it to gain the same level of confidence as obtained by IPsec. The purpose is not to choose between IPsec and IEEE 802.11--2007 security (as both are required at different layers), rather it is to help understand what could be added to the IEEE 802.11--2007 standard to make it as secure as IPsec.